Goodbye Gateway Appliances.
   Hello Secure Cloud Gateway.

iboss Acceptable Use Policy

This Acceptable Use Policy (“AUP”) applies to the use of the Company Property, offered by iboss, Inc. (“Company”) to its customers (each, a “Customer”) and end-users (each, an “End-User”) whose mobile devices, computers, or computer systems, whether corporate-owned or personal (BYOD), have been registered with Company Property (each, a “Registered Device”).  Capitalized terms used herein but undefined have the meanings given to such term in the Company’s Terms of Service Agreement available at:

This AUP describes certain functionalities of the Company Property as well as unacceptable practices and prohibited actions while using the Company Property.  As a Customer and/or End-User of the Company Property, you acknowledge and agree that you have read, understood and agree to this AUP.  As a Customer, you also acknowledge and agree that you will ensure that your End-Users, including without limitation, any of your employees, independent contractors, representatives, and agents, abide by this AUP and that you will be responsible for violations of this AUP by your End-Users. Company reserves the right to modify this AUP at any time, notifying you either via e-mail, the Company Property or by posting a revised copy of this AUP on our website.  You agree to review this AUP on a regular basis and remain in compliance at all times.

Company Property

Among other things, the Company Property enables Customers to control, manage and secure certain aspects and functionalities of Registered Devices.  For example, the Company Property enables Customers to:

  • Secure all aspects of Internet traffic including web filtering, SSL access, applications, bandwidth throttling/QoS, on/off-premise mobile security, and BYOD management tools;
  • Set restrictions on certain Registered Device functionalities, such as restrictions on use of camera features, Bluetooth, or WiFi;
  • Set and enforce policies for applications, such as blacklisted apps;
  • Set social media controls;
  • Monitor and secure SaaS data;
  • Wipe lost devices and monitor applications; and
  • Create compliance reports.

Company does not monitor the content that Customer or any End-User transmits or receives through the Company Property.

Prohibited Uses

  1. No Infringing, Illegal, Threatening, Defamatory, and Offensive Uses.  Neither Customer or End-User may use the Company Property to violate any applicable laws, rules, or regulations issued or promulgated by any competent government authority, including the federal Computer Fraud and Abuse Act (18 U.S.C. § 1030) and Electronic Communications Privacy Act (18 U.S.C. § 2510 et. seq).  Without limiting the foregoing, neither Customer nor any End-User shall use the Company Property for, or in connection with, the following:
  • Theft or infringement of copyrights, trademarks, trade secrets, or other types of intellectual property.
  • Fraud, forgery, or theft or misappropriation of funds, credit cards, or personal information.
  • Export, re-export, or transfer restricted software, algorithms or other data in violation of applicable export control laws.
  • Deceptive practices such as posing as another service for the purposes of phishing or pharming. 
  • Distributing any materials of a threatening or harmful nature, including without limitation threats of death or physical harm, or materials that are malicious, harassing, libelous, defamatory, or which facilitate extortion.
  • Distributing any offensive materials, including without limitation obscene, pornographic, indecent or hateful materials and materials which promote gambling or discrimination based on race, sex, religion, nationality, disability, sexual orientation, or age. 
  1. Necessary Consents.  Customer and End-User understand and agree that: (i) the Company Property may be used for legal purposes only; (ii) Customer is solely responsible for obtaining all necessary and appropriate consents from End-Users to access, monitor, modify and use the Registered Devices via the Company Property; (iii) Customer shall not access, monitor, modify or use such Registered Devices via the Company Property without obtaining the prior written consent from each applicable End-User; and (iv) Customer shall not use the Company Property in any manner which exceeds the scope of any consents obtained pursuant to subparts “ii” and “iii”. 
  2. BYOD.  Customer shall not access the personal email accounts or other personal applications on any Registered Device which is the personal property of its End-User (a “BYOD Device”).  Customer understands and agrees that BYOD Devices are the personal property of their respective End-Users, and as such will only access and use those applications and systems on each BYOD Device to which Customer has prior written consent.  In the event any BYOD Device is lost or stolen, Customer shall not delete or wipe any personal data, personal applications or other personal content of the applicable End-User via the Company Property, without the express written consent of such End-User to do so.  In addition, Customer shall not monitor or track the physical movements of any End-User via their BYOD Device without the express consent of use End-User; provided, however, that Customer shall not monitor End-User’s physical movements in violation of applicable law, including without limitation, the National Labor Relations Act.
  3. Security and Interference.  Customer and End-User shall not use the Company Property to violate, attempt to violate, or knowingly facilitate the violation of the security or integrity of any network, electronic service, or other system that is accessible through, or in connection with, the Company Property. Customer and End-User shall not use the Company Property in a manner that interferes with any other party’s ability to use and enjoy the Company Property, that interferes with Company’s or its service partners’ ability to provide the Company Property, or that otherwise may create legal liability for Company or its service partners in Company’s sole discretion.  Customer and End-User shall not use the Company Property to violate the acceptable use policy or terms of service of any other service provider, including, without limitation, any Internet service provider. Without limiting the foregoing, Customer and End-User shall not use the Company Property for, or in connection with, the following: 
  • Hacking, cracking into, or otherwise using the non-public areas of the Company Property or any other system without authorization.
  • Unauthorized probes or port scans for vulnerabilities.
  • Unauthorized penetration tests, traffic that circumvents authentication systems or other unauthorized attempts to gain entry into any system.
  • Web crawling which is not restricted to a rate so as not to impair or otherwise disrupt the servers being crawled.
  • Unauthorized network monitoring or packet capture.
  • Forged or non-standard protocol headers, such as altering source addresses.
  • Flooding.
  • Denial of Service (DoS) attacks of any kind.
  • Distributing unauthorized data, malware, viruses, Trojan horses, spyware, worms, or other malicious or harmful code.
  • Operating network Company Property such as: open proxies; open mail relays; or open, recursive domain name servers.
  • Sharing or publishing content from the Company Property to cause, or have the consequence of causing, the user of the content to be in violation of the terms and this AUP.
  1. Violations.  If Customer or End-User becomes aware of any violation of this AUP by any third party, Customer or End-User, as applicable, shall promptly report such violation to Company by contacting
  2. Changes to Policy.  This AUP is subject to occasional revision, and if Company makes any substantial changes to this AUP, Company will prominently post notice of the changes on the Company website.  Any material changes to this AUP will be effective upon thirty (30) calendar days following Company’s posting of notice of the changes on the Company website. Continued use of the Company Property, following notice of such changes, shall indicate acknowledgement of such changes and agreement to be bound by the terms and conditions of such changes.

This Acceptable Use Policy was last revised in May 5th,  2017.